填空题Vulnerabilities of Bluetooth like bluejacking are______ in the development of technology.
填空题People can send you data without your permission because the Bluetooth connection is______.